Knowledge Management & Information Sharing

Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct, and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes.

Recent Inquiries

What open standards apply to zero trust implementation?

What open standards apply to zero trust implementation?

What integrated priority list needs have the combatant commands submitted for civilian harm mitigation and response capabilities?

What integrated priority list needs have the combatant commands submitted for civilian harm mitigation and response capabilities?

What databases have geometry files for blue and red force aircraft and ground vehicle models in OBJ, 3DS, STL, or other formats?

What databases have geometry files for blue and red force aircraft and ground vehicle models in OBJ, 3DS, STL, or other formats?

Articles

F
graphic red network lines

NSA, FBI, CISA, and Allies Issue Advisory About Russian Military Cyber Actors

FORT MEADE, Md. – The National Security Agency (NSA) joins the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and international allies in publishing the Cybersecurity Advisory (CSA) “Russian Military Cyber Actors…

F
eight-inch wafer that can selectively reflect different colors of light

Lighting the Way for Quantum Innovation

ALBUQUERQUE, N.M. — Sandia National Laboratories and Arizona State University, two research powerhouses, are collaborating to push the boundaries of quantum technology and transform large-scale optical systems into compact integrated microsystems. Nils Otterstrom, a Sandia…

F
ORNL's Moe Khaleel, left, associate laboratory director for national security sciences, and Maurice Singleton III, chief executive officer of U2opia Technology, celebrate the partnership between Oak Ridge National Laboratory and U2opia Technology. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

U2opia Signs License to Commercialize Anomaly-Detection Technology for Cybersecurity

U2opia Technology has licensed Situ and Heartbeat, a package of technologies from the Department of Energy’s Oak Ridge National Laboratory that offers a new method for advanced cybersecurity monitoring in real time. Situ, which discovers…

Webinars

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

RESCHEDULED: Fundamentals of Cross-Domain Solutions in the DoD

THIS WEBINAR HAS BEEN RESCHEDULED FOR WEDNESDAY, FEBRUARY 21st at 12:00 PM ET A cross-domain solution (CDS) is a capability that can be used to securely connect discrete systems or networks, which may have different…

Cyber Security and Digital Data Protection Concept

Uncomfortable Truths About Cybersecurity

In this webinar, participants will drill into the history of cybersecurity and computer science and consider some first principles. Decisions made in the 1970s by the founders of both career fields have not been revisited…

Events

More than 250 data scientists, coders and developers referred to as “hackers,” gathered to develop prototypes within set timeframes to initiate and validate innovative concepts in Stuttgart Germany, June 7, 2024. BRAVO Hackathons, sponsored by senior Department of Defense leaders, foster innovative environments where government and industry collaborate to test bold ideas using real DOD data. (U.S. Army photo by Staff Sgt. Aaron Daugherty)

ITEN Wired | TechNet CyberCoast Conference

Join us October 16-18, 2024 in beautiful Pensacola Beach, Florida for an event celebrating the southeast tech community. ITEN (innovation, technology, entrepreneurship, and network) WIRED |TechNet CyberCoast is the tech conference to connect, collaborate, and…

National Summit on Military Training, Modeling, & Simulation

Synthetic environments, integrating cutting-edge technologies such as virtual reality, augmented reality, mixed reality, and artificial intelligence, are reshaping traditional training methodologies, and offering a vital means to enhance readiness and resilience among military personnel. Against…

global network map

TechNet Indo-Pacific

TechNet Indo-Pacific is a strategic event in the Indo-Pacific Rim. This year’s conference — “Free – Open – Secure” — focuses on the critical issues identified by regional military leaders to maintain and protect data…